舉報

會員
Nagios Core Administrators Cookbook
Tom Ryder 著
更新時間:2021-08-05 18:12:20
開會員,本書免費讀 >
最新章節(jié):
Index
ThisbookiswritteninCookbookstyle,beginningwithrecipesbasedonbasicstructurewhichgraduallyprogressestowardsusingNagiosCoreasamonitoringframework.ThisbookisforSystemAdministratorswhoarelookingforrecipestohelpthemdealwithadvancednetworkmonitoringissueswithNagiosCore.
最新章節(jié)
- Index
- Getting extra visualizations with NagVis
- Writing customized Nagios Core reports
- Reading status into a MySQL database with NDOUtils
- Tracking host and service states with Nagiosgraph
- Setting up an event handler script
品牌:中圖公司
上架時間:2021-08-05 17:49:00
出版社:Packt Publishing
本書數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- Index 更新時間:2021-08-05 18:12:20
- Getting extra visualizations with NagVis
- Writing customized Nagios Core reports
- Reading status into a MySQL database with NDOUtils
- Tracking host and service states with Nagiosgraph
- Setting up an event handler script
- Submitting passive checks in response to SNMP traps
- Submitting passive checks from a remote host with NSCA
- Allowing and submitting passive checks
- Introduction
- Chapter 11. Automating and Extending Nagios Core
- Setting up a redundant monitoring host
- Improving startup times with pre-cached object files
- Monitoring Nagios performance with Nagiostats
- Writing debugging information to a Nagios log file
- Using authenticated contacts
- Requiring authentication for the web interface
- Introduction
- Chapter 10. Security and Performance
- Dynamically building host definitions
- Defining macros in a resource file
- Using inheritance to simplify configuration
- Building groups using regular expressions
- Configuring host roles using groups
- Keeping configuration under version control
- Grouping configuration files in directories
- Introduction
- Chapter 9. Managing Configuration
- Using the network map as an overlay
- Monitoring individual nodes in a cluster
- Establishing a service dependency
- Establishing a host dependency
- Choosing icons for hosts
- Using the network map
- Creating a network host hierarchy
- Introduction
- Chapter 8. Managing Network Layout
- Acknowledging a problem via the web interface
- Scheduling checks from the web interface
- Viewing configuration in the web interface
- Adding comments on hosts or services in the web interface
- Viewing and interpreting notification history
- Viewing and interpreting trends
- Viewing and interpreting availability reports
- Using the Tactical Overview
- Introduction
- Chapter 7. Using the Web Interface
- Using check_by_ssh with key authentication instead of NRPE
- Giving limited sudo privileges to NRPE
- Creating new NRPE command definitions securely
- Setting allowed client hosts for NRPE
- Setting the listening address for NRPE
- Monitoring local services on a remote machine with NRPE
- Introduction
- Chapter 6. Enabling Remote Execution
- Creating an SNMP OID to monitor
- Monitoring a RAID or other hardware device
- Monitoring the output of an SNMP query
- Monitoring database services
- Checking that a website returns a given string
- Monitoring web services
- Monitoring mail services
- Checking an alternative SSH port
- Monitoring SSH for any host
- Monitoring PING for any host
- Introduction
- Chapter 5. Monitoring Methods
- Defining a custom notification method
- Defining an escalation for repeated notifications
- Automating contact rotation
- Tolerating a certain number of failed checks
- Specifying which states to be notified about
- Configuring notification for groups
- Configuring notification periods
- Introduction
- Chapter 4. Configuring Notifications
- Adjusting flapping percentage thresholds for a service
- Managing brief outages with flapping
- Scheduling downtime for a host or service
- Changing thresholds for disk usage
- Changing thresholds for PING RTT and packet loss
- Specifying how frequently to check a host or service
- Introduction
- Chapter 3. Working with Checks and States
- Writing a new plugin from scratch
- Using an alternative check command for hosts
- Customizing an existing command
- Creating a new command
- Removing a plugin
- Installing a plugin
- Finding a plugin
- Introduction
- Chapter 2. Working with Commands and Plugins
- Running a service on all hosts in a group
- Creating a new time period
- Creating a new contactgroup
- Creating a new servicegroup
- Creating a new hostgroup
- Verifying configuration
- Creating a new e-mail contact
- Creating a new HTTP service
- Creating a new network host
- Introduction
- Chapter 1. Understanding Hosts Services and Contacts
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Support files eBooks discount offers and more
- www.PacktPub.com
- About the Reviewers
- About the Author
- Nagios Core Administration Cookbook
- Credits
- coverpage
- coverpage
- Credits
- Nagios Core Administration Cookbook
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Understanding Hosts Services and Contacts
- Introduction
- Creating a new network host
- Creating a new HTTP service
- Creating a new e-mail contact
- Verifying configuration
- Creating a new hostgroup
- Creating a new servicegroup
- Creating a new contactgroup
- Creating a new time period
- Running a service on all hosts in a group
- Chapter 2. Working with Commands and Plugins
- Introduction
- Finding a plugin
- Installing a plugin
- Removing a plugin
- Creating a new command
- Customizing an existing command
- Using an alternative check command for hosts
- Writing a new plugin from scratch
- Chapter 3. Working with Checks and States
- Introduction
- Specifying how frequently to check a host or service
- Changing thresholds for PING RTT and packet loss
- Changing thresholds for disk usage
- Scheduling downtime for a host or service
- Managing brief outages with flapping
- Adjusting flapping percentage thresholds for a service
- Chapter 4. Configuring Notifications
- Introduction
- Configuring notification periods
- Configuring notification for groups
- Specifying which states to be notified about
- Tolerating a certain number of failed checks
- Automating contact rotation
- Defining an escalation for repeated notifications
- Defining a custom notification method
- Chapter 5. Monitoring Methods
- Introduction
- Monitoring PING for any host
- Monitoring SSH for any host
- Checking an alternative SSH port
- Monitoring mail services
- Monitoring web services
- Checking that a website returns a given string
- Monitoring database services
- Monitoring the output of an SNMP query
- Monitoring a RAID or other hardware device
- Creating an SNMP OID to monitor
- Chapter 6. Enabling Remote Execution
- Introduction
- Monitoring local services on a remote machine with NRPE
- Setting the listening address for NRPE
- Setting allowed client hosts for NRPE
- Creating new NRPE command definitions securely
- Giving limited sudo privileges to NRPE
- Using check_by_ssh with key authentication instead of NRPE
- Chapter 7. Using the Web Interface
- Introduction
- Using the Tactical Overview
- Viewing and interpreting availability reports
- Viewing and interpreting trends
- Viewing and interpreting notification history
- Adding comments on hosts or services in the web interface
- Viewing configuration in the web interface
- Scheduling checks from the web interface
- Acknowledging a problem via the web interface
- Chapter 8. Managing Network Layout
- Introduction
- Creating a network host hierarchy
- Using the network map
- Choosing icons for hosts
- Establishing a host dependency
- Establishing a service dependency
- Monitoring individual nodes in a cluster
- Using the network map as an overlay
- Chapter 9. Managing Configuration
- Introduction
- Grouping configuration files in directories
- Keeping configuration under version control
- Configuring host roles using groups
- Building groups using regular expressions
- Using inheritance to simplify configuration
- Defining macros in a resource file
- Dynamically building host definitions
- Chapter 10. Security and Performance
- Introduction
- Requiring authentication for the web interface
- Using authenticated contacts
- Writing debugging information to a Nagios log file
- Monitoring Nagios performance with Nagiostats
- Improving startup times with pre-cached object files
- Setting up a redundant monitoring host
- Chapter 11. Automating and Extending Nagios Core
- Introduction
- Allowing and submitting passive checks
- Submitting passive checks from a remote host with NSCA
- Submitting passive checks in response to SNMP traps
- Setting up an event handler script
- Tracking host and service states with Nagiosgraph
- Reading status into a MySQL database with NDOUtils
- Writing customized Nagios Core reports
- Getting extra visualizations with NagVis
- Index 更新時間:2021-08-05 18:12:20